The malicious code hiding techniques, code obfuscation problem

J. Hurtuk, M. Copjak, M. Dufala, Pavol Drienik
{"title":"The malicious code hiding techniques, code obfuscation problem","authors":"J. Hurtuk, M. Copjak, M. Dufala, Pavol Drienik","doi":"10.1109/ICETA.2014.7107581","DOIUrl":null,"url":null,"abstract":"Nowadays, in world of modern technologies and technology society, information can be the most valuable commodity on the market and so gathering it, buy or sell it becomes the most important part of doing business. Because of the prizing, the more sophisticated ways of gathering and processing of the information are still being developed, various kinds of more sophisticated and faster systems are being created and more complex technologies are being made, which clearly opens various paths for various criminal menaces. To be able to react appropriate and fast on this threads and protect valuable property of its own, to protect the data and be able to find an appropriate solution for protecting them and for preventing them from damage or any other misusing, man should be aware of the processes behind the whole cycle and be able to define the whole menace scope given to the general situation and scenario.","PeriodicalId":340996,"journal":{"name":"2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2014 IEEE 12th IEEE International Conference on Emerging eLearning Technologies and Applications (ICETA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICETA.2014.7107581","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 5

Abstract

Nowadays, in world of modern technologies and technology society, information can be the most valuable commodity on the market and so gathering it, buy or sell it becomes the most important part of doing business. Because of the prizing, the more sophisticated ways of gathering and processing of the information are still being developed, various kinds of more sophisticated and faster systems are being created and more complex technologies are being made, which clearly opens various paths for various criminal menaces. To be able to react appropriate and fast on this threads and protect valuable property of its own, to protect the data and be able to find an appropriate solution for protecting them and for preventing them from damage or any other misusing, man should be aware of the processes behind the whole cycle and be able to define the whole menace scope given to the general situation and scenario.
恶意代码隐藏技术,代码混淆问题
如今,在现代技术和技术社会的世界里,信息可以是市场上最有价值的商品,因此收集它,购买或出售它成为做生意最重要的部分。由于悬赏,收集和处理信息的更复杂的方法仍在发展中,各种更复杂、更快的系统正在被创造出来,更复杂的技术正在被制造出来,这显然为各种犯罪威胁开辟了各种途径。为了能够对这些线程做出适当和快速的反应,保护自己的宝贵财产,保护数据,并能够找到适当的解决方案来保护它们,防止它们受到损害或任何其他滥用,人们应该意识到整个周期背后的过程,并能够根据一般情况和场景定义整个威胁范围。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信